Національний юридичний університет імені Ярослава Мудрого ⚖ Головна ⓘ Довiдка
Авторизацiя
Прiзвище (укр.)
N Читацького квитка
 

Базы данных


Е-картотека "Публікації вчених НЮУ ім. Ярослава Мудрого в Scopus" - результати пошуку

Вид пошуку

  • Власна база даних
  • Більше 728 000 документів: книги, статті, збірники наукових праць, рідкісні видання, дисертації, автореферати
  • Створюється з 1999 року
  • Легкий, зручний, багатоаспектний інформаційний пошук
  • Можливість цілодобово працювати з інформаційним контентом
  • Електронне замовлення книг дистанційно
Область поиска
в найденном
 Найдено в других БД:Eлектронний каталог (278)Зведений електронний каталог «Правова освіта. Правова культура» (6)
Формат представлення знайдених документів :
полныйинформационныйкраткий
Отсортировать найденные документы по:
авторузаглавиюгоду изданиятипу документа
Пошуковий запит: 

(<.>K=TEC$<.>)

Загальна кількість знайденихдокументів : 50
Показані документи с 1 по 10
 1-10    11-20   21-30   31-40   41-50  
1.
Tatsyi, V.
    Semantic network of knowledge in science of law [Текст] / V. Tatsyi, A. Getman, S. Ivanov // Proceedings of the IASTED International Conference on Automation, Control, and Information Technology - Information and Communication Technology, ACIT-ICT 2010 : International Conference on Automation, Control, and Information Technology, held June 15 - 18, 2010 in Novosibirsk, Russia : ACTA Press, 2010. - P. 218-222
   Перевод заглавия: Семантическая сеть знаний в сфере правовой науки
ББК Х062
РУБ DOI: 10.2316/P.2010.691-076

Аннотация: The manuscript deals with the task of creating a semantic network of knowledge for lawyers. The network takes into account the peculiarities of legal information: low degree of structure development; textual character; a substantial volume; usage of synonyms; descriptive nature and location in different sources. The structure of the knowledge database realizing ontology represented of legal information has been developed. The legal knowledge database is presented by notion system with a random set of connections. The work concerns the developed software package JURONT and methods of its usage. The software package consists of 4 products, ensuring all the regimes of this systems functioning. The tasks that can be solved on the legal knowledge database in this software package have been formulated. These materials will be applied in Yaroslav the Wise National Law Academy of Ukraine (Kharkiv, Ukraine) as a knowledge–oriented consultative system of students individual studying in speciality “Law” and checking their knowledge.

Анотація - 0 байт
Анотація,
Анотація - 0 байт
Анотація

Найти похожие

2.
Yevseiev, S.
    Development and analysis of gametheoretical models of security systems agents interaction [Текст] / S. Yevseiev, O. Milov, S. Milevskyi, O. Voitko, M. Kasianenko, Y. Melenti, S. Pohasii, H. Stepanov, O. Turinskyi, S. Turinskyi // Eastern-European Journal of Enterprise Technologies. - 2020. - Vol. 2. Issue 4. - P. 15-29
   Перевод заглавия: Разработка и анализ теоретико-игровых моделей взаимодействия агентов систем безопасности
УДК
ББК З81
РУБ DOI: https://doi.org/10.15587/1729-4061.2020.201418

Аннотация: A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of decisions made, unlike the widely used heuristics, the possibility of developing reliable protection based on analytical results, ensuring a timely response to cyberattacks in conditions of limited resources, as well as distributed nature of decision making are highlighted. The definitions of the basic concepts used in security tasks based on game-theoretic models are introduced. The features of the application of game theory methods in the field of cybersecurity are listed and the limitations of research in this area are formulated, namely: a restriction on game strategies, simultaneous moves of players in the behavior patterns of security system agents, uncertainty in the time the players take the move, uncertainty in the final goal of the enemy, unpredictability of further player moves, lack of players’ assessment of enemy resources. as well as its ultimate goals, the inability to timely assess the current state of the game. The game-theoretic models are aligned with the listed security problems, and the main solutions obtained as a result of using the corresponding models are also determined. Many methods of game theory have been formed, for each of which a relationship is determined between the game model, its scope, simulation result and security services that the method under consideration supports. The limitations of the classical representation of game theory models are determined, the need to overcome which follows from the requirements for providing basic security services. Such limitations include: the ability of the defender to detect attacks, the certainty of the probabilities of a change of state before the start of the game, the synchronism of the players’ moves, the inability to scale the model due to the size and complexity of the system under consideration. Models of the main tasks of the interaction of antagonistic agents of security systems have been developed. The resulting models made it possible to obtain solutions to two of the most common tasks in the field of cybersecurity, namely, the interaction of the system administrator and the attacker in organizing the protection of information resources. The tasks are solved for various conditions – the game matrix contains cost estimates of resources and the matrix reflects the probability of threat realization. Pure and mixed strategies are defined for various initial conditions, which allows to exclude from the consideration strategies that are not included in the solution. A synergistic approach to the use of game-theoretic modeling was formed taking into account the behavior of agents of security systems, based on an analysis of the diversity and characteristics of game-theoretic models, their inherent limitations and scope

Текст - 0 байт
Текст,
Текст - 0 байт
Текст

Найти похожие

3.
Meerson, А.
    Forms and methods of evaluation of the future teacher training results [Text] / А. Meerson, A. Chernyaev, . Hladush, V. Philippov, L. Nikolenko, V. Revazov, O. Lysytska // International Journal of Advanced Science and Technology. - 2020. - Vol. 29, Iss. 7. - p. 2165-2170. - Припинена індексація в Scopus 30.06.2020
   Перевод заглавия: Формы и методы оценки результатов подготовки будущего учителя
ББК Ч48

Аннотация: The use of the portfolio in the educational process in higher education institutions was analyzed. Its efficiency for evaluating students' knowledge as well as its advantages in comparison with traditional methods of evaluation is shown. To determine the indicators of students' professional readiness level regarding the organization of the educational process, we analyzed: summaries of the lessons independently conducted by the student-practitioner, on the given subject, on the subject and the elective course; the number of conducted lessons on the subject and the selected course; the average evaluation of the effectiveness of all conducted by the student lessons on the subject in accordance with their analysis; the total number of visited lessons with the provision of their analysis; the student's use of modern methods of evaluation before the end of the academic year.

Текст - 0 байт
Текст

Найти похожие

4.
Pukala, R.
    Usage of E-Тechnologies to enhance infocommunication in financing innovation [Text] / R. Pukala, S. Hlibko, Vnukova N., Davidenko D. // IEEE International Scientific-Practical Conference: Problems of Infocommunications Science and Technology, PIC S and T 2019 - Proceedings. - 2019. - p. 157-160
   Перевод заглавия: Использование электронных технологий для улучшения инфокоммуникаций в финансировании инноваций
ББК Х623.92

Аннотация: The article deals with the actual issues of choosing the best way to finance innovation in the application of e-technology for improving the level of communication in the provision of educational services. The criteria of this choice are proposed and an expert evaluation is carried out. The results of the study were obtained in the Decision Making Helper © software. Priority of extrabudgetary funds in financing innovations and their influence on the general development of the investment project has been established. Examples of the application of this e-technology for determining the priority direction of development in different fields are given, which allowed to form the author's methodology of work with the program in order to acquire the competencies of users (including students in the process of learning).

Анотація - 0 байт
Анотація

Найти похожие

5.
Matyushenko, I. .
    Assessment of the development of foreign trade in high-tech production of Ukraine under the association with the EU [Текст] / I. Matyushenko, S. Hlibko, M. M. Petrova, M. S. Pasmor, M. Loktionova // Business management and education. - 2020. - Vol. 18, Issue: 1. - P. 157-182
   Перевод заглавия: Оцінка розвитку зовнішньої торгівлі високотехнологічним виробництвом України в рамках асоціації з ЄС
УДК
РУБ DOI: 10.3846/bme.2020.11578

Аннотация: Purpose – the purpose of article should assess the main factors affecting the development of trade in high-tech products of Ukraine in the context of association with the EU and the spread of a new industrial revolution. Research methodology – the scheme of research of trade of high-tech products of Ukraine from the EU on the basis of qualitative and quantitative economic-statistical analysis, analysis of comparative advantages and correlation-regression analysis. Findings – the results of the analysis show that the main factors determining the low presence of Ukraine in the world market of high-tech products are the outdated structure of production, a low level of R&D costs, and a decrease in the innovative activity of Ukrainian enterprises. The article presents the author’s recommendations on improving the effectiveness of foreign trade in high-tech products of Ukraine in the EU market. Research limitations – the absence of a state development strategy for the production of hightech products does not make it possible to accurately determine indicators of scientific research of the potential of Ukraine. Practical implications – correlation-regression analysis results can be used in the private and state sectors of the economy of Ukraine. Originality/Value – the original combination of schemes and methods allowed us to identify new critical places for export development in the context of the association of Ukraine with the EU.

Текст - 0 байт
Текст

Найти похожие

6.
Satokhina, N. .
    “The loss of experience” in digital age: Legal implications [Текст] / N. Satokhina, Y. Razmetaeva // Phenomenology and Mind. - 2021. - No. 20. - P. 128-136
   Перевод заглавия: “Втрата досвіду” в епоху цифрових технологій: правові наслідки
УДК
РУБ DOI: 10.17454/pam-2011

Аннотация: Exploring the history of our experience, Hannah Arendt reveals not only a radical transformation of its structure, but also the loss of experience as such and its replacement with technology. In order to identify the place of law in this process, we are trying to clarify the legal aspect of experience in terms of phenomenological hermeneutics and to trace its transformation in the digital age. The experience of law is thought of as one of the aspects of our mode of being-in-the-world, which is based on openness to the world and consists in the mutual recognition of people in their dignity. Digital technologies, in turn, contribute to replacing fundamental openness with illusory freedom in cyberspace. The latter, unlike the public realm as a realm of action of many, and in this sense legal realm, is based primarily on productive activities of one and no longer requires law.

Текст - 0 байт
Текст

Найти похожие

7.
Matyushenko, I. .
    Assessment of Innovation Cooperation of Ukraine and Scandinavian Countries in Terms of the New Industrial Revolution [Текст] / I. Matyushenko, S. Hlibko, O. Prokopenko, V. Ryeznikov, O. Khanova // Estudios de economia aplicada. - 2021. - Vol. 39, Iss. 6, Special Iss.:SI. - P. не зазначено
РУБ DOI10.25115/eea.v39i6.5306

Работа с электронной копией документа возможна только в читальном зале библиотеки


Найти похожие

8.
Velychko, O. .
    Essential R Peak Detector Based on the Polynomial Fitting [Text] / O. Velychko, О. Datsok, І. Perova // Lecture Notes on Data Engineering and Communications Technologies. - 2022. - Vol. 77. - p. 148-163
   Перевод заглавия: Основний детектор піків R на основі поліноміальної арматури
ББК З
РУБ DOI: 10.1007/978-3-030-82014-5_10

Аннотация: R peaks detection is one of the uncomplicated tasks, successfully solved for the stationary ECG systems. The finite computational capacities of the recent mobile devices circumscribe applying powerful methods for ECG waves recognition. Proposed in this paper method of R peaks detection is based on the evaluation of the shape of an m sample segment and oriented to develop specific mobile applications conjugated with a portable ECG device. R peaks recognition is performed with the parameters, obtained as the result of polynomial fitting an m sample segment and characterizing the segment shape and position of the segment central point relatively the focus point. The complex of criteria for R peak distinguish was defined as the result of analysis of testing signals from the MIT-BIH Arrhythmia Database. The algorithm for R peaks searching in an optionally defined time interval was developed and can be used for the formation of RR intervals array for the heart rate monitoring. The sensitivity of the method for the raw signals with positive R peaks and is 99.6%.

Анотація - 0 байт
Анотація

Найти похожие

9.
Hetman, Y. A..
    Implementation practice of electronic administrative services in Ukraine [Text] = Практика впровадження електронних адміністративних послуг в Україні / Y. A. Hetman, V. S. Politanskyі, I. V. Semenikhin // Journal of the National Academy of Legal Sciences of Ukraine. - 2021. - Vol. 28, Iss. 2. - p. 93-104
ББК Х621.03
РУБ DOI 10.37635/jnalsu.28(2).2021.93-104

Аннотация: One of the factors for the development of civil society in Ukraine is an effective, well-functioning institution for providing administrative electronic services. Despite the intensity and wide scope of research covering various aspects of providing electronic administrative services to the population, many issues in this area remain quite debatable, as well as understudied, which conditioned the relevance of the study. The study is aimed at studying the organisational and procedural aspects of providing electronic administrative services in Ukraine. Authors of this study clarified the significance of some fundamental concepts of this issue. The author's approach to defining the concept of electronic administrative services was formulated based on a personal interpretation of this concept from the standpoint of general theoretical analysis. Administrative mechanisms for implementing electronic public services were analysed. The study investigated the features of classification of electronic administrative services by types of electronic representation, by field of activity, by form of ownership, by consumers, by place of receipt from the standpoint of the client and from the standpoint of involvement in the electronic service. This study is the first to analyse the regulatory framework of Ukraine on the provision of electronic administrative services in stages and chronologically. Authors studied and compared the features of the procedure for rendering electronic administrative services using the Unified State Portal of Administrative Services, the iGov portal of state electronic services and the Ukrainian online service of public services – Diia. The study covered the procedure for the operation of administrative service centres in Ukraine. It was concluded that the first step of Ukraine towards creating its information society through the introduction of e-governance should be the establishment of a market for administrative and information electronic services.

Текст - 0 байт
Текст

Найти похожие

10.
Yevseiev, S. .
    Development of a Concept for Building a Critical Infrastructure Facilities Security System [Text] / S. Yevseiev, Y. Melenti, O. Voitko, V. Hrebeniuk, A. Korchenko, S. Mykus, O. Milov, O. Prokopenko, O. Sievierinov, D. Chopenko // Eastern-European Journal of Enterprise Technologies. - 2021. - Vol. 3. - P. 63-83
   Перевод заглавия: Розробка концепції побудови системи безпеки об'єктів критичної інфраструктури
ББК Х621.162
РУБ DOI 10.15587/1729-4061.2021.233533

Аннотация: To effectively protect critical infrastructure facilities (CIF), it is important to understand the focus of cybersecurity efforts. The concept of building security systems based on a variety of models describing various CIF functioning aspects is presented. The development of the concept is presented as a sequence of solving the following tasks. The basic concepts related to cyberattacks on CIF were determined, which make it possible to outline the boundaries of the problem and determine the level of formalization of the modeling processes. The proposed threat model takes into account possible synergistic/emergent features of the integration of modern target threats and their hybridity. A unified threat base that does not depend on CIF was formed. The concept of modeling the CIF security system was developed based on models of various classes and levels. A method to determine attacker's capabilities was developed. A concept for assessing the CIF security was developed, which allows forming a unified threat base, assessing the signs of their synergy and hybridity, identifying critical CIF points, determining compliance with regulatory requirements and the state of the security system. The mathematical tool and a variety of basic models of the concept can be used for all CIFs, which makes it possible to unify preventive measures and increase the security level. It is proposed to use post-quantum cryptography algorithms on crypto-code structures to provide security services. The proposed mechanisms provide the required stability (230–235 group operations), the rate of cryptographic transformation is comparable to block-symmetric ciphers (BSC) and reliability (Perr 10–9–10–12)

Текст - 0 байт
Текст

Найти похожие

 1-10    11-20   21-30   31-40   41-50  
 

Умовні позначення місця знаходження

3_пов.(ЗПІ) – зала правової інформації, НБК

4_пов.(НАб) – абонемент наукової літератури, НБК

4_пов.(ДБФ) – довідково-бібліографічний фонд, НБК

5_пов.(З/П) – зала періодичних видань, НБК

6_пов.(АХЛ) – абонемент художньої літератури, НБК

6_пов.(ЗІЛ) – зала літератури іноземними мовами, НБК

7_пов.(Хр) – книгосховище, НБК

8_пов.(РК) – книгосховище рідкісних видань та дисертацій, НБК

НБВ – інформаційно-бібліографічний відділ, НБК, 7 поверх

Ст.Аб. – студентський абонемент, НБК, 5 поверх

Філ №1 – філія № 1 (вул. Динамівська, 4)

Філ №2 – філія № 2 (вул. Пушкінська, 106)

Полт. фак. – Полтавський юридичний інститут, м. Полтава